Follow
Allison Beemer
Title
Cited by
Cited by
Year
A generalized algebraic approach to optimizing SC-LDPC codes
A Beemer, S Habib, CA Kelley, J Kliewer
2017 55th Annual Allerton Conference on Communication, Control, and…, 2017
252017
Avoiding trapping sets in SC-LDPC codes under windowed decoding
A Beemer, CA Kelley
2016 International Symposium on Information Theory and Its Applications…, 2016
172016
Explicit optimal-length locally repairable codes of distance 5
A Beemer, R Coatney, V Guruswami, HH Lopez, F Pinero
2018 56th Annual Allerton Conference on Communication, Control, and…, 2018
142018
Learning to decode: Reinforcement learning for decoding of sparse graph-based channel codes
S Habib, A Beemer, J Kliewer
Advances in neural information processing systems 33, 22396-22406, 2020
112020
Authentication against a myopic adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE Conference on Communications and Network Security (CNS), 1-5, 2019
102019
Belief propagation decoding of short graph-based channel codes via reinforcement learning
S Habib, A Beemer, J Kliewer
IEEE Journal on Selected Areas in Information Theory 2 (2), 627-640, 2021
92021
Authentication and partial message correction over adversarial multiple-access channels
A Beemer, E Graves, J Kliewer, O Kosut, P Yu
2020 IEEE Conference on Communications and Network Security (CNS), 1-6, 2020
82020
Structured coding for authentication in the presence of a malicious adversary
A Beemer, O Kosut, J Kliewer, E Graves, P Yu
2019 IEEE International Symposium on Information Theory (ISIT), 617-621, 2019
82019
Learned scheduling of LDPC decoders based on multi-armed bandits
S Habib, A Beemer, J Kliewer
2020 IEEE International Symposium on Information Theory (ISIT), 2789-2794, 2020
62020
Network Decoding
A Beemer, AB Kılı, A Ravagnani
IEEE Transactions on Information Theory, 2023
52023
Authentication with mildly myopic adversaries
A Beemer, E Graves, J Kliewer, O Kosut, P Yu
2020 IEEE International Symposium on Information Theory (ISIT), 984-989, 2020
52020
Network decoding against restricted adversaries
A Beemer, AB Kılı, A Ravagnani
IFAC-PapersOnLine 55 (30), 236-241, 2022
42022
Analysis of absorbing sets using cosets and syndromes
E McMillon, A Beemer, CA Kelley
2020 IEEE International Symposium on Information Theory (ISIT), 367-372, 2020
42020
Graph-based codes for hierarchical recovery
A Beemer, R Kshirsagar, GL Matthews
2022 IEEE International Symposium on Information Theory (ISIT), 1554-1559, 2022
32022
The curious case of the diamond network
A Beemer, A Ravagnani
arXiv preprint arXiv:2107.02144, 2021
32021
Absorbing sets of codes from finite geometries
A Beemer, K Haymaker, CA Kelley
Cryptography and Communications 11, 1115-1131, 2019
32019
Design and analysis of graph-based codes using algebraic lifts and decoding networks
A Beemer
The University of Nebraska-Lincoln, 2018
32018
Reldec: Reinforcement learning-based decoding of moderate length ldpc codes
S Habib, A Beemer, J Kliewer
IEEE Transactions on Communications, 2023
22023
Extremal absorbing sets in low-density parity-check codes
E McMillon, A Beemer, CA Kelley
22023
Erasure correction and locality of hypergraph codes
A Beemer, C Mayer, CA Kelley
Coding Theory and Applications: 5th International Castle Meeting, ICMCTA…, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20